Professional Documents
Culture Documents
Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Security & Cybersecurity fundamentals / Information and Network Security
Quiz review
Started on Wednesday, 24 January 2024, 11:31 PM
State Finished
Completed on Wednesday, 24 January 2024, 11:35 PM
Time taken 4 mins 13 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00
Question 1
Correct
A network administrator observes a sudden, unusually high volume of traffic to a specific server, causing it to become unresponsive. What type of network
attack might this be indicative of?
Network Attack
46684
Man-in-the-Middle Attack
DDoS Attack
Phishing Attack
Question 2
46684
Correct
In a company, a firewall, antivirus software, and intrusion detection system (IDS) are examples of which cybersecurity components?
Security Measures
Security Procedures
Security Policies
Security Protocols
46684
The correct answer is: Security Measures
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 1/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review
Question 3
Incorrect
A user receives an email that appears to be from their bank, requesting personal and financial information. What type of cyber threat does this email likely
represent?
Question 4
Correct
46684
An organization wants to ensure that sensitive customer data is encrypted and stored securely. What aspect of information security does this relate to?
Data Encryption
Data Classification
Data Loss Prevention
Data Backup
Question 5
46684
Correct
Security Policies
Security Protocols
Security Procedures
Employee Privacy Policy
46684
The correct answer is: Employee Privacy Policy
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 2/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review
Question 6
Correct
In the context of information security for supplier relationships, what does the acronym "SLA" stand for?
Question 7
Correct
46684
What is the term for the unauthorized access to a network in order to gather information and potentially exploit vulnerabilities?
Network Attack
Firewall Breach
Network Scanning
Data Exfiltration
Question 8
Correct
46684
Mark 1.00 out of 1.00
What network security terminology is used to describe a technique in which an attacker intercepts and possibly alters communication between two parties
without their knowledge?
Man-in-the-Middle (MiTM)
Firewall Breach
Phishing Attack
46684
Network Attack
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 3/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review
Question 9
Correct
Which network security concept is primarily concerned with ensuring that data is not intercepted or altered during transmission?
Intrusion Detection
Data Encryption
Firewall Configuration
User Authentication
Question 10
Correct
46684
Sarah receives an email from an unknown sender with a suspicious attachment. She is unsure if she should open it. What type of cybersecurity threat is this
scenario related to?
Firewall
Malware
Antivirus
Goodware
46684
◄ Network Security
Jump to...
46684
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 4/4